Debian Bug report logs -
#1032420
libtpms: CVE-2023-1017 CVE-2023-1018
Reply or subscribe to this bug.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Seunghun Han <kkamagui@gmail.com>
:
Bug#1032420
; Package src:libtpms
.
(Mon, 06 Mar 2023 13:09:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>
:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Seunghun Han <kkamagui@gmail.com>
.
(Mon, 06 Mar 2023 13:09:03 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: libtpms
Version: 0.9.2-3
Severity: grave
Tags: security upstream
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Hi,
The following vulnerabilities were published for libtpms.
CVE-2023-1017[0]:
| An out-of-bounds write vulnerability exists in TPM2.0's Module Library
| allowing writing of a 2-byte data past the end of TPM2.0 command in
| the CryptParameterDecryption routine. An attacker who can successfully
| exploit this vulnerability can lead to denial of service (crashing the
| TPM chip/process or rendering it unusable) and/or arbitrary code
| execution in the TPM context.
CVE-2023-1018[1]:
| An out-of-bounds read vulnerability exists in TPM2.0's Module Library
| allowing a 2-byte read past the end of a TPM2.0 command in the
| CryptParameterDecryption routine. An attacker who can successfully
| exploit this vulnerability can read or access sensitive data stored in
| the TPM.
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2023-1017
https://www.cve.org/CVERecord?id=CVE-2023-1017
[1] https://security-tracker.debian.org/tracker/CVE-2023-1018
https://www.cve.org/CVERecord?id=CVE-2023-1018
[2] https://github.com/stefanberger/libtpms/commit/324dbb4c27ae789c73b69dbf4611242267919dd4
[3] https://kb.cert.org/vuls/id/782720
[4] https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf
Regards,
Salvatore
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Tue Mar 7 13:07:24 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.